• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr infrastructure

Results 76 - 100 of 260Sort Results By: Published Date | Title | Company Name
By: Oracle CX     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle CX
By: IBM Watson Health     Published Date: Sep 29, 2017
In the world of value-based healthcare, your data is the key to extracting the most actionable insights that provide real value to your organization. But getting to those insights can prove difficult, especially if you have to connect disparate data sources. You need transparency into key insights that can help your team make more informed decisions for the success of your organization. In this listicle, we explore five ways an analytics solution can help you transform your organization through the power of insight. From risk modeling to predictive analytics, utilizing the right mix of analytics can improve patient outcomes and ultimately move your organization closer to your ideal value-based care model
Tags : 
value-based care, analytics, insights, data, business intelligence, ehr, fee-for-service, cognitive, predictive, outcomes, infrastructure
    
IBM Watson Health
By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
By: Dell EMC     Published Date: Aug 17, 2017
If your business uses a three-tier architecture with disaggregated servers, storage, and SAN to run applications, you might be considering upgrading to an integrated solution to streamline your business. However, implementing a hyperconverged Dell EMC XC Series cluster powered by Nutanix software is an even more attractive option that can provide over 73 percent greater database performance - an advantage that translates to 50 percent greater database performance per dollar than a traditional integrated solution.
Tags : 
three-tier architecture, disaggregated servers, integrated solution, hyperconverged infrastructure, database performance
    
Dell EMC
By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
By: Oracle + Dyn     Published Date: Jun 29, 2017
DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: Common types of DDoS attacks and which layers of your infrastructure are most at risk How to geographically isolate attacks and mitigate latency when you have multiple endpoints How to get the best before, during and after attack protection Get the guide!
Tags : 
    
Oracle + Dyn
By: Oracle + Dyn     Published Date: Jun 27, 2017
"DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency when you have multiple endpoints • How to get the best before, during and after attack protection Get the guide! "
Tags : 
    
Oracle + Dyn
By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
By: RedHat     Published Date: May 10, 2017
Transform to a digital business through infrastructure optimization.
Tags : 
improve service, reduce costs, it modernization, trends, red hat, infrastructure
    
RedHat
By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
By: IBM     Published Date: Apr 19, 2017
Data is only as good as the insights it produces, the actions it influences, and the results it fosters. That’s the secret recipe for data management. Your business stakeholders depend on data-based insights to drive decisions and priorities throughout the organization. Insights based on sound data practices can give your business a competitive advantage in the marketplace. Is your data management system ready to support your business? Find out using Forrester’s Data Management Infrastructure Self-Assessment Tool. IBM has licensed this tool to help you identify the areas of strength and opportunities for improvement.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
By: Dell EMC     Published Date: Feb 23, 2017
Enterprises of all sizes are undergoing massive data center modernization initiatives. They are looking to use technology to cut costs and drive competitive advantage. At the core of many of these transformations is an effort to reengineer IT delivery models to enable cloudlike flexibility of resources, and reduce both capital expenditures and operational overhead. That is giving rise to the private cloud movement. Indeed, private cloud adoption is accelerating and maturing. IT organizations are looking to the private cloud for the elasticity it can provide to add or remove resources as required. In fact, ESG research reveals that more than three-quarters of organizations would classify their private cloud deployment as either an advanced internal cloud or a basic internal cloud. Those organizations that have virtualized at least half of their production applications are more than twice as likely as their more physical infrastructure-dependent counterparts to categorize their environme
Tags : 
    
Dell EMC
By: Schneider Electric     Published Date: Feb 17, 2017
This paper demonstrates, through a series of examples, how data center infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : 
dcim, costs, operational processes, data centers
    
Schneider Electric
By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo and Intel®
By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications
    
IBM
By: Citrix     Published Date: Nov 14, 2016
Does your application infrastructure meet modern business user needs? Download this infograph to learn how to deliver business agility through datacenter automation with Citrix NetScaler and Cisco Application Centric Infrastructure (ACI).
Tags : 
cisco, citrix, citrix netscaler, cisco aci, application centric infrastructure, networking, enterprise applications
    
Citrix
By: IBM     Published Date: Nov 07, 2016
Is your software defined infrastructure (SDI) for high performance computing (HPC) and big data analytics meeting the needs of your growing business? Would you like to know how to justify the switching cost from unsupported open source software to a commercial grade SDI that ensures your resources are more effectively used cutting down time to market? This webcast will give you an overview of the true costs of building out and managing a HPC or Big Data environment and how commercial grade SDI software from IBM can provide a significant return on investment.
Tags : 
ibm, platform computing, software defined infrastructure, enterprise applications
    
IBM
By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security, it management, data management
    
QTS
By: IBM     Published Date: Oct 18, 2016
Digital Transformation. Agile applications. Open source software. Join IDC analyst Al Gillen as he presents IDC's view of what they mean for applications, infrastructure - and customers.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions, enterprise applications
    
IBM
By: Schneider Electric     Published Date: Oct 17, 2016
This paper demonstrates, through a series of examples, how data center infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : 
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter